Jump to content

youngzzzzzzz

Member
  • Posts

    22
  • Joined

  • Last visited

Profile Information

  • Jailbroken
    No
  • Rooted
    No

Recent Profile Visitors

1,541 profile views

youngzzzzzzz's Achievements

Newbie

Newbie (1/14)

  • Week One Done
  • One Month Later
  • One Year In
  • 2 Years In
  • 3 Years In

Recent Badges

2

Reputation

  1. Name of the game you want hacked: [ Captain Tsubasa Japan ]キャプテン翼 ~たたかえドリームチーム~ Version of the game: 4.3.0 iTunes Link for the app: https://apps.apple.com/jp/app/id1181335936 Jailbroken or Non-Jailbroken: Jailbroken Requested Features: - Enemies Don't Move- Enemies Have 0 Stamina- Weak Enemies or just jailbreak bypass is ok.
  2. Interested also
  3. Thanks much for this!
  4. thank u very much @@shmoo Any suggetion of spoofing UDID for arch 'arm64' ?
  5. syslog of my iphone6s plus 9.0.2jb before crashed [0;37mJul 20 17:14:49 iPhone[0;36m MobileSafari[20940][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:14:49 iPhone[0;36m MobileSafari[20940][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:14:49 iPhone[0;36m MobileSafari[20940][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:14:49 iPhone[0;36m com.apple.xpc.launchd[1][m (UIKitApplication:com.apple.mobilesafari[0xaa3f][20940])[m <Notice>: Service exited due to signal: Illegal instruction: 4 [0;37mJul 20 17:14:49 iPhone[0;36m diagnosticd[177][2;31m <[0;31mError[2;31m>[0;37m:[m unable to find offset 0x9a7f3a5c in shared cache for arch 'arm64' [0;37mJul 20 17:14:49 iPhone[0;36m SpringBoard[783][2;33m <[0;33mWarning[2;33m>[0;37m:[m Application 'UIKitApplication:com.apple.mobilesafari[0xaa3f]' crashed. and my iphone5s 9.1jb [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;32m <[0;32mNotice[2;32m>[0;37m:[m MS:Notice: Injecting: com.apple.mobilesafari [MobileSafari] (1241.11) [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;32m <[0;32mNotice[2;32m>[0;37m:[m CoreFoundation = 1241.110000 [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;32m <[0;32mNotice[2;32m>[0;37m:[m Could not match CoreFoundation = 1241.110000 [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:30:42 iPhone[0;36m MobileSafari[969][2;33m <[0;33mWarning[2;33m>[0;37m:[m my hookfunction [0;37mJul 20 17:30:42 iPhone[0;36m diagnosticd[191][2;31m <[0;31mError[2;31m>[0;37m:[m error evaluating process info - pid: 969, puniqueid: 969 [0;37mJul 20 17:30:42 iPhone[0;36m com.apple.xpc.launchd[1][m (UIKitApplication:com.apple.mobilesafari[0x8cb0][969])[m <Notice>: Service exited due to signal: Illegal instruction: 4 [0;37mJul 20 17:30:42 iPhone[0;36m SpringBoard[779][2;33m <[0;33mWarning[2;33m>[0;37m:[m Application 'UIKitApplication:com.apple.mobilesafari[0x8cb0]' crashed. Tweak.xm: #import <CoreFoundation/CoreFoundation.h> #import "substrate.h" #import "MobileGestalt.h" CFPropertyListRef (*orig_MGCopyAnswer)(CFStringRef key);//hook MGCopyAnswer CFPropertyListRef replace_MGCopyAnswer(CFStringRef key) { NSLog(@"my hookfunction"); return orig_MGCopyAnswer(key); } __attribute__((constructor)) static void initialize() { MSHookFunction(MGCopyAnswer,replace_MGCopyAnswer,&orig_MGCopyAnswer); } makefile: export ARCHS = armv7 arm64 export TARGET = iphone:clang:latest:8.0 include $(THEOS_MAKE_PATH)/common.mk TWEAK_NAME = DemoTweak DemoTweak_FILES = Tweak.xm DemoTweak_LIBRARIES = flipswitch MobileGestalt DemoTweak_LDFLAGS += -Wl,-segalign,4000 DemoTweak_CFLAGS = -Wno-c++11-extensions include $(THEOS_MAKE_PATH)/tweak.mk include $(THEOS_MAKE_PATH)/aggregate.mk after-install:: # install.exec "killall -9 SpringBoard" any ideas?
  6. tested on iphone6s plus & iphone5s I thought arm64 devices can not hook like this. #import <CoreFoundation/CoreFoundation.h> #import "substrate.h" #import "libMobileGestalt.h" CFPropertyListRef (*orig_MGCopyAnswer)(CFStringRef key);//hook MGCopyAnswer CFPropertyListRef replace_MGCopyAnswer(CFStringRef key) { NSLog(@"my hookfunction"); return orig_MGCopyAnswer(key); } __attribute__((constructor)) static void initialize() { MSHookFunction(MGCopyAnswer,replace_MGCopyAnswer,&orig_MGCopyAnswer); } any ideas to hook MGCopyAnswer on arm64 devices??
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines